Following is a problem from Computer Networking: A Top-Down Approach (6 th Editi
ID: 3534007 • Letter: F
Question
Following is a problem from Computer Networking: A Top-Down Approach (6th Edition) chapter 8 problem 21:
Suppose Alice and Bob are communicating over an SSL session. Suppose an attacker, who does not have any of the shared keys, inserts a bogus TCP segment into a packet stream with correct TCP checksum and sequence numbers (and correct IP addresses and port numbers). Will SSL at the receiving side accept the bogus packet and pass the payload to the receiving application? Why or why not?
I am looking for both the answer and the answer to "why or why not."
Explanation / Answer
the correct wanswer is NO
reason-
SSL sends records, each of which includes a message digest. To create
the message digest, one needs a shared key, which the attacker doesn